Mobile Security

Mobile security news, trends, analysis and practical advice

nordvpn
security light

security code big data cyberespionage DDoS

Windows Trojan hacks into embedded devices to install Mirai

Attackers have started to use Windows and Android malware to hack into embedded devices, dispelling the belief that if such devices are not directly exposed to the Internet they're less vulnerable.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

BlackBerry

BlackBerry offers secure mobile communications platform for developers

BlackBerry announced a new line of business to provide developers with a secure, cloud-based, mobile communications platform for texting, voice, video and file sharing.

01 workforce

7 musts for any successful BYOD program

Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

credit card fraud

Online card fraud up as thieves avoid more secure chip cards for in-store payments

Deterred by more secure chip cards for in-store payments, thieves have resorted to stealing credit-card numbers and passwords or opening new accounts with false credentials to use in making online payments for purchases, according to...

free wi fi thinkstock

Stay safe on your Android phone while using free public Wi-Fi

A few simple steps will go a long way towards improved security when you use public WiFi on your Android phone.

170104 blackberry 2

TCL targets Apple, Samsung with new BlackBerry handset

For a brand that's been written off by many, TCL Communication has big plans for BlackBerry.

iot security

BlackBerry unveils BlackBerry Secure for enterprise IoT mobile security

BlackBerry touted a comprehensive mobile-security platform for a variety of IoT devices connected to enterprises

thieving magpie

U.S. and U.K. spy agencies have intercepted in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

fingerprint

Feds: It's legal to demand fingerprints to unlock phones of everyone in a building

Federal prosecutors wanted cops to collect fingerprints and thumbprints of everyone in a building to unlock all smartphones at that location.

glass office cloud

Business transformation proves to be catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

biometrics fingerscan smartphone

Chase Mobile grasps the obvious about biometrics

On Monday, Chase quietly stopped asking for passwords for sensitive transfers on its mobile app, concluding that a fingerprint-scan is quite sufficient.

samsung note7 iris setup

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

150817 google marshmallow 06

Qualcomm-powered Android devices plagued by four rooting flaws

Hundreds of millions of Android devices based on Qualcomm chipsets are likely exposed to at least one of four critical vulnerabilities that allow non-privileged apps to take them over.

internet of things smart house

Your router won’t protect you when smartphones attack smart homes

Your home router, or firewall, won't protect you when smartphones attack smart homes.

Load More